Dark Reading

The Makings of a Better Cybersecurity Hire

05/25/2021
Experience counts, but as one CISO has learned, don't overlook a creative, motivated candidate just because their background doesn't match the job description.

The Adversary Within: Preventing Disaster From Insider Threats

05/25/2021
Insiders are in a position of trust, and their elevated permissions provide opportunities to cause serious harm to critical business applications and processes.

Businesses Boost Security Budgets. Where Will the Money Go?

05/25/2021
Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post-breach costs, and spending priorities.

Turn the Tables: Supply Chain Defense Needs Some Offense, Fortinet Says

05/25/2021
SPONSORED CONTENT: Watch now -- While the SolarWinds hack put fresh attention on supply chain vulnerabilities, Derek Manky of Fortinet's Fortiguard Labs suggests dismantling cybercriminals' own supply chains.

Cartoon Caption Winner: Magic May

05/24/2021
And the winner of The Edge's May cartoon caption contest is ...

Former FBI Employee Indicted for Taking Documents Home

05/24/2021
The long-time intelligence analyst was accused of inappropriately handling documents related to national security.

Air India Confirms Data of 4.5M Travelers Compromised

05/24/2021
Affected data includes names, birthdates, contact information, passport details, and credit card data, the airline reports.

Sophos Research Uncovers Widespread Use of TLS By Cybercriminals

05/24/2021
SPONSORED CONTENT: Nearly half of all malware is being disseminated via the Transport Layer Security cryptographic protocol, says Dan Schiappa, executive VP and chief product officer for Sophos.

Work from Home Modifies the Endpoint Security Equation, Cisco Says

05/24/2021
SPONSORED CONTENT: As customers get to grips with this new WFH reality, they'll need to simplify their implementations and make more use of automation, says Cisco Secure's Al Huger.

As Threat Hunting Matures, Malware Labs Emerge

05/24/2021
By leveraging their analysis outputs, security pros can update detection rules engines and establish a stronger security posture in the process.

Cyber Insurance Firms Start Tapping Out as Ransomware Continues to Rise

05/24/2021
A global insurance carrier refuses to write new ransomware policies in France, while insurers rewrite policies. Are we heading toward a day when ransomware incidents become uninsurable?

Data in Danger Amid New IT Challenges

05/21/2021
Survey finds new threats due to the pandemic make managing enterprise cyber-risk even more challenging.

FBI Issues Conti Ransomware Alert as Attacks Target Healthcare

05/21/2021
Officials have identified at least 16 Conti ransomware attacks targeting US healthcare and first responder networks.

Cloud Security Blind Spots: Where They Are and How to Protect Them

05/21/2021
Security experts discuss oft-neglected areas of cloud security and offer guidance to businesses working to strengthen their security posture.

The Edge Poll: Moving On

05/21/2021
During the stresses of the pandemic, did you ever consider quitting security?

The Changing Face of Cybersecurity Awareness

05/21/2021
In the two decades since cybersecurity awareness programs emerged, they've been transformed from a good idea to a business imperative.

Dev-Sec Disconnect Undermines Secure Coding Efforts

05/20/2021
Rather than continue to complain about each other, developers and security pros need to work together and celebrate their successes.

Lack of Skills, Maturity Hamper Threat Hunting at Many Organizations

05/20/2021
When implemented correctly, threat hunting can help organizations stay head of threats, researcher says at RSA Conference.

Don't Let Scary Headlines Shape Your Company's Cyber-Resilience Strategy

05/20/2021
Resilience planning should be based on data and backed by technology, cybersecurity pros agreed at this week's RSA Conference.

Maricopa County CISO: Online Misinformation/Disinformation in 2020 Election a 'Gamechanger'

05/20/2021
Custom playbooks played a key role in the Arizona election jurisdiction's security strategy.